diff --git a/CVE-2020/CVE-2020-184xx/CVE-2020-18404.json b/CVE-2020/CVE-2020-184xx/CVE-2020-18404.json new file mode 100644 index 00000000000..4cbee04dedc --- /dev/null +++ b/CVE-2020/CVE-2020-184xx/CVE-2020-18404.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2020-18404", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-27T21:15:15.650", + "lastModified": "2023-06-27T21:15:15.650", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in espcms version P8.18101601. There is a cross site scripting (XSS) vulnerability that allows arbitrary code to be executed via the title parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/source-hunter/espcms/issues/1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-184xx/CVE-2020-18406.json b/CVE-2020/CVE-2020-184xx/CVE-2020-18406.json new file mode 100644 index 00000000000..3b5fa82190f --- /dev/null +++ b/CVE-2020/CVE-2020-184xx/CVE-2020-18406.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2020-18406", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-27T20:15:09.297", + "lastModified": "2023-06-27T20:45:06.090", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in cmseasy v7.0.0 that allows user credentials to be sent in clear text due to no encryption of form data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/source-hunter/cmseasy/issues/1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-184xx/CVE-2020-18409.json b/CVE-2020/CVE-2020-184xx/CVE-2020-18409.json new file mode 100644 index 00000000000..536202608e0 --- /dev/null +++ b/CVE-2020/CVE-2020-184xx/CVE-2020-18409.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2020-18409", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-27T21:15:15.717", + "lastModified": "2023-06-27T21:15:15.717", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Request Forgery (CSRF) vulnerability was discovered in CatfishCMS 4.8.63 that would allow attackers to obtain administrator permissions via /index.php/admin/index/modifymanage.html." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/xwlrbh/Catfish/issues/5", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-184xx/CVE-2020-18410.json b/CVE-2020/CVE-2020-184xx/CVE-2020-18410.json new file mode 100644 index 00000000000..8456f3b0978 --- /dev/null +++ b/CVE-2020/CVE-2020-184xx/CVE-2020-18410.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2020-18410", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-27T20:15:09.373", + "lastModified": "2023-06-27T20:45:06.090", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A stored cross site scripting (XSS) vulnerability in /index.php?admin-master-article-edit of Chaoji CMS v2.18 that allows attackers to obtain administrator privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/GodEpic/chaojicms/issues/6", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-184xx/CVE-2020-18413.json b/CVE-2020/CVE-2020-184xx/CVE-2020-18413.json new file mode 100644 index 00000000000..bb1c7c2f99b --- /dev/null +++ b/CVE-2020/CVE-2020-184xx/CVE-2020-18413.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2020-18413", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-27T20:15:09.423", + "lastModified": "2023-06-27T20:45:06.090", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Stored cross site scripting (XSS) vulnerability in /index.php?admin-master-navmenu-add of Chaoji CMS v2.18 that allows attackers to execute arbitrary code." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/GodEpic/chaojicms/issues/5", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-184xx/CVE-2020-18414.json b/CVE-2020/CVE-2020-184xx/CVE-2020-18414.json new file mode 100644 index 00000000000..9dc4bdce4c7 --- /dev/null +++ b/CVE-2020/CVE-2020-184xx/CVE-2020-18414.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2020-18414", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-27T21:15:15.763", + "lastModified": "2023-06-27T21:15:15.763", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stored cross site scripting (XSS) vulnerability in Chaoji CMS v2.18 that allows attackers to execute arbitrary code via /index.php?admin-master-webset." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/GodEpic/chaojicms/issues/3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-184xx/CVE-2020-18416.json b/CVE-2020/CVE-2020-184xx/CVE-2020-18416.json new file mode 100644 index 00000000000..29ba3c29096 --- /dev/null +++ b/CVE-2020/CVE-2020-184xx/CVE-2020-18416.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2020-18416", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-27T20:15:09.473", + "lastModified": "2023-06-27T20:45:06.090", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An cross site request forgery (CSRF) vulnerability discovered in Jymusic v2.0.0.,that allows attackers to execute arbitrary code via /admin.php?s=/addons/config.html&id=6 to modify payment information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/dtorp06/jymusic/issues/1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-184xx/CVE-2020-18418.json b/CVE-2020/CVE-2020-184xx/CVE-2020-18418.json index ae28fc84da4..eef4a77e77e 100644 --- a/CVE-2020/CVE-2020-184xx/CVE-2020-18418.json +++ b/CVE-2020/CVE-2020-184xx/CVE-2020-18418.json @@ -2,8 +2,8 @@ "id": "CVE-2020-18418", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-27T19:15:09.047", - "lastModified": "2023-06-27T19:15:09.047", - "vulnStatus": "Received", + "lastModified": "2023-06-27T20:45:06.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-199xx/CVE-2020-19902.json b/CVE-2020/CVE-2020-199xx/CVE-2020-19902.json new file mode 100644 index 00000000000..64aef623e87 --- /dev/null +++ b/CVE-2020/CVE-2020-199xx/CVE-2020-19902.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2020-19902", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-27T20:15:09.520", + "lastModified": "2023-06-27T20:45:06.090", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Directory Traversal vulnerability found in Cryptoprof WCMS v.0.3.2 allows a remote attacker to execute arbitrary code via the wex/cssjs.php parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/vedees/wcms/issues/3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-200xx/CVE-2020-20070.json b/CVE-2020/CVE-2020-200xx/CVE-2020-20070.json index 846e48ed6ee..c11523edc73 100644 --- a/CVE-2020/CVE-2020-200xx/CVE-2020-20070.json +++ b/CVE-2020/CVE-2020-200xx/CVE-2020-20070.json @@ -2,19 +2,75 @@ "id": "CVE-2020-20070", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-20T15:15:10.263", - "lastModified": "2023-06-20T15:49:15.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T20:05:18.187", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability found in wkeyuan DWSurvey 1.0 allows a remote attacker to execute arbitrary code via thequltemld parameter of the qu-multi-fillblank!answers.action file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:diaowen:dwsurvey:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "51ACABD1-BE5D-48E0-9CC7-4975FD6AA75B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wkeyuan/DWSurvey/issues/48", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-203xx/CVE-2020-20335.json b/CVE-2020/CVE-2020-203xx/CVE-2020-20335.json index 2de35def46f..9b9b4fc01d7 100644 --- a/CVE-2020/CVE-2020-203xx/CVE-2020-20335.json +++ b/CVE-2020/CVE-2020-203xx/CVE-2020-20335.json @@ -2,19 +2,76 @@ "id": "CVE-2020-20335", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-20T15:15:10.307", - "lastModified": "2023-06-20T15:49:15.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T20:09:20.373", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in Antirez Kilo before commit 7709a04ae8520c5b04d261616098cebf742f5a23 allows a remote attacker to cause a denial of service via the editorUpdateRow function in kilo.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kilo_project:kilo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020-07-02", + "matchCriteriaId": "1D895359-DB10-442C-98EE-6A91A63D5DA6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/antirez/kilo/issues/60", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-204xx/CVE-2020-20413.json b/CVE-2020/CVE-2020-204xx/CVE-2020-20413.json index 2b3b1890208..fac9c925fc9 100644 --- a/CVE-2020/CVE-2020-204xx/CVE-2020-20413.json +++ b/CVE-2020/CVE-2020-204xx/CVE-2020-20413.json @@ -2,19 +2,74 @@ "id": "CVE-2020-20413", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-20T15:15:10.350", - "lastModified": "2023-06-20T15:49:15.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T20:14:54.677", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability found in WUZHICMS v.4.1.0 allows a remote attacker to execute arbitrary code via the checktitle() function in admin/content.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/SuperSalsa20/WUZHICMS-SQL-Injection/blob/master/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-204xx/CVE-2020-20491.json b/CVE-2020/CVE-2020-204xx/CVE-2020-20491.json index 845d71ca9d9..cedd634974d 100644 --- a/CVE-2020/CVE-2020-204xx/CVE-2020-20491.json +++ b/CVE-2020/CVE-2020-204xx/CVE-2020-20491.json @@ -2,19 +2,77 @@ "id": "CVE-2020-20491", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-20T15:15:10.403", - "lastModified": "2023-06-20T15:49:15.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T20:21:31.930", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in OpenCart v.2.2.00 thru 3.0.3.2 allows a remote attacker to execute arbitrary code via the Fba plugin function in upload/admin/index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opencart:opencart:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.2.00", + "versionEndIncluding": "3.0.3.2", + "matchCriteriaId": "9000F917-5FEB-41E5-8BA6-C9E0CD546C34" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/opencart/opencart/issues/7612", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-205xx/CVE-2020-20502.json b/CVE-2020/CVE-2020-205xx/CVE-2020-20502.json index 54d00734116..84796891078 100644 --- a/CVE-2020/CVE-2020-205xx/CVE-2020-20502.json +++ b/CVE-2020/CVE-2020-205xx/CVE-2020-20502.json @@ -2,23 +2,82 @@ "id": "CVE-2020-20502", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-20T15:15:10.443", - "lastModified": "2023-06-20T15:49:15.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T20:36:34.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross Site Request Forgery found in yzCMS v.2.0 allows a remote attacker to execute arbitrary code via the token check function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yzmcms:yzmcms:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9E7EE46F-852A-4E5D-81CC-05BD43AE219C" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.yzmcms.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/yzmcms/yzmcms/issues/27", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-206xx/CVE-2020-20636.json b/CVE-2020/CVE-2020-206xx/CVE-2020-20636.json index 0fc9d4455d3..f9bd5cb41af 100644 --- a/CVE-2020/CVE-2020-206xx/CVE-2020-20636.json +++ b/CVE-2020/CVE-2020-206xx/CVE-2020-20636.json @@ -2,19 +2,74 @@ "id": "CVE-2020-20636", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-20T15:15:10.487", - "lastModified": "2023-06-20T15:49:15.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T20:38:56.623", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability found in Joyplus-cms v.1.6.0 allows a remote attacker to access sensitive information via the id parameter of the goodbad() function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joyplus-cms_project:joyplus-cms:1.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A76F9F13-189B-40D0-9B9D-620024B26AC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/joyplus/joyplus-cms/issues/447", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-206xx/CVE-2020-20697.json b/CVE-2020/CVE-2020-206xx/CVE-2020-20697.json index e610c8c8ce9..a57fa394c77 100644 --- a/CVE-2020/CVE-2020-206xx/CVE-2020-20697.json +++ b/CVE-2020/CVE-2020-206xx/CVE-2020-20697.json @@ -2,19 +2,75 @@ "id": "CVE-2020-20697", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-20T15:15:10.537", - "lastModified": "2023-06-20T15:49:15.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T20:46:57.530", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in khodakhah NodCMS v.3.0 allows a remote attacker to execute arbitrary code and gain access to senstivie information via a crafted script to the address parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nodcms:nodcms:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BDB187B4-9534-425E-8766-91D5BBC8CA78" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/khodakhah/nodcms/issues/41", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-207xx/CVE-2020-20703.json b/CVE-2020/CVE-2020-207xx/CVE-2020-20703.json index 62f78c77f4f..9999957114d 100644 --- a/CVE-2020/CVE-2020-207xx/CVE-2020-20703.json +++ b/CVE-2020/CVE-2020-207xx/CVE-2020-20703.json @@ -2,19 +2,76 @@ "id": "CVE-2020-20703", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-20T15:15:10.580", - "lastModified": "2023-06-20T15:49:15.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T20:54:33.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in VIM v.8.1.2135 allows a remote attacker to execute arbitrary code via the operand parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vim:vim:8.1.2135:*:*:*:*:*:*:*", + "matchCriteriaId": "3AB267E1-74B2-451E-AFFB-DFC40046C132" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vim/vim/issues/5041", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-14xx/CVE-2022-1441.json b/CVE-2022/CVE-2022-14xx/CVE-2022-1441.json index 8e5750b4986..f7fcddd9437 100644 --- a/CVE-2022/CVE-2022-14xx/CVE-2022-1441.json +++ b/CVE-2022/CVE-2022-14xx/CVE-2022-1441.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1441", "sourceIdentifier": "secalert@redhat.com", "published": "2022-04-25T17:15:36.547", - "lastModified": "2023-05-27T04:15:20.370", - "vulnStatus": "Modified", + "lastModified": "2023-06-27T20:43:05.850", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-125" } ] }, @@ -100,6 +100,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + } + ] + } + ] } ], "references": [ @@ -122,7 +137,10 @@ }, { "url": "https://www.debian.org/security/2023/dsa-5411", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22034.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22034.json index 8bddc9cfc83..2ecc6c6f93b 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22034.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22034.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22034", "sourceIdentifier": "secure@microsoft.com", "published": "2022-07-12T23:15:09.567", - "lastModified": "2023-05-17T17:15:11.720", - "vulnStatus": "Modified", + "lastModified": "2023-06-27T20:44:45.057", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "CWE-416" } ] } @@ -250,7 +250,11 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22034", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-227xx/CVE-2022-22715.json b/CVE-2022/CVE-2022-227xx/CVE-2022-22715.json index 7dd55e09ca2..ace57427ce3 100644 --- a/CVE-2022/CVE-2022-227xx/CVE-2022-22715.json +++ b/CVE-2022/CVE-2022-227xx/CVE-2022-22715.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22715", "sourceIdentifier": "secure@microsoft.com", "published": "2022-02-09T17:15:10.117", - "lastModified": "2022-05-23T17:29:19.003", + "lastModified": "2023-06-27T20:23:36.597", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "CWE-191" } ] } diff --git a/CVE-2022/CVE-2022-256xx/CVE-2022-25649.json b/CVE-2022/CVE-2022-256xx/CVE-2022-25649.json index 1b48aec9511..a77def912f1 100644 --- a/CVE-2022/CVE-2022-256xx/CVE-2022-25649.json +++ b/CVE-2022/CVE-2022-256xx/CVE-2022-25649.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25649", "sourceIdentifier": "audit@patchstack.com", "published": "2022-08-05T16:15:11.493", - "lastModified": "2022-08-08T17:39:10.953", + "lastModified": "2023-06-27T20:44:35.397", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-258xx/CVE-2022-25817.json b/CVE-2022/CVE-2022-258xx/CVE-2022-25817.json index a040a6e0112..85c06dfc584 100644 --- a/CVE-2022/CVE-2022-258xx/CVE-2022-25817.json +++ b/CVE-2022/CVE-2022-258xx/CVE-2022-25817.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25817", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-03-10T17:47:18.757", - "lastModified": "2022-03-16T03:37:22.437", + "lastModified": "2023-06-27T20:39:56.397", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-259xx/CVE-2022-25959.json b/CVE-2022/CVE-2022-259xx/CVE-2022-25959.json index 3d24604f1d8..b485fd8a572 100644 --- a/CVE-2022/CVE-2022-259xx/CVE-2022-25959.json +++ b/CVE-2022/CVE-2022-259xx/CVE-2022-25959.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25959", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-04-01T23:15:14.470", - "lastModified": "2022-04-08T13:42:11.737", + "lastModified": "2023-06-27T20:40:57.613", "vulnStatus": "Analyzed", "descriptions": [ { @@ -85,8 +85,18 @@ }, "weaknesses": [ { - "source": "ics-cert@hq.dhs.gov", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2566.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2566.json index 79692ea14ba..433cadc9b90 100644 --- a/CVE-2022/CVE-2022-25xx/CVE-2022-2566.json +++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2566.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2566", "sourceIdentifier": "cve-coordination@google.com", "published": "2022-09-23T12:15:10.103", - "lastModified": "2022-10-01T02:27:40.717", + "lastModified": "2023-06-27T20:44:29.407", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-787" + "value": "CWE-190" } ] }, diff --git a/CVE-2022/CVE-2022-260xx/CVE-2022-26090.json b/CVE-2022/CVE-2022-260xx/CVE-2022-26090.json index 184e92f6a4f..63d0ebc8f8c 100644 --- a/CVE-2022/CVE-2022-260xx/CVE-2022-26090.json +++ b/CVE-2022/CVE-2022-260xx/CVE-2022-26090.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26090", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-04-11T20:15:20.897", - "lastModified": "2022-04-19T01:22:34.583", + "lastModified": "2023-06-27T20:42:45.240", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-261xx/CVE-2022-26125.json b/CVE-2022/CVE-2022-261xx/CVE-2022-26125.json index d192e3c0143..b7a9f760adf 100644 --- a/CVE-2022/CVE-2022-261xx/CVE-2022-26125.json +++ b/CVE-2022/CVE-2022-261xx/CVE-2022-26125.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26125", "sourceIdentifier": "secalert@redhat.com", "published": "2022-03-03T18:15:08.090", - "lastModified": "2022-03-09T20:15:25.863", + "lastModified": "2023-06-27T20:23:49.610", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-1284" } ] }, diff --git a/CVE-2022/CVE-2022-261xx/CVE-2022-26127.json b/CVE-2022/CVE-2022-261xx/CVE-2022-26127.json index 79928396089..b7e4890d9a9 100644 --- a/CVE-2022/CVE-2022-261xx/CVE-2022-26127.json +++ b/CVE-2022/CVE-2022-261xx/CVE-2022-26127.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26127", "sourceIdentifier": "secalert@redhat.com", "published": "2022-03-03T18:15:08.193", - "lastModified": "2022-03-09T20:13:29.583", + "lastModified": "2023-06-27T20:26:26.217", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-1284" } ] }, diff --git a/CVE-2022/CVE-2022-261xx/CVE-2022-26128.json b/CVE-2022/CVE-2022-261xx/CVE-2022-26128.json index 7248e2851a3..a34269ec9f5 100644 --- a/CVE-2022/CVE-2022-261xx/CVE-2022-26128.json +++ b/CVE-2022/CVE-2022-261xx/CVE-2022-26128.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26128", "sourceIdentifier": "secalert@redhat.com", "published": "2022-03-03T18:15:08.243", - "lastModified": "2022-03-09T20:17:48.750", + "lastModified": "2023-06-27T20:38:30.520", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-1284" } ] }, diff --git a/CVE-2022/CVE-2022-26xx/CVE-2022-2639.json b/CVE-2022/CVE-2022-26xx/CVE-2022-2639.json index 749d269b86f..773a142ac51 100644 --- a/CVE-2022/CVE-2022-26xx/CVE-2022-2639.json +++ b/CVE-2022/CVE-2022-26xx/CVE-2022-2639.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2639", "sourceIdentifier": "secalert@redhat.com", "published": "2022-09-01T21:15:09.600", - "lastModified": "2023-01-20T13:05:07.377", + "lastModified": "2023-06-27T20:52:02.907", "vulnStatus": "Analyzed", "descriptions": [ { @@ -45,11 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-191" - }, - { - "lang": "en", - "value": "CWE-787" + "value": "CWE-681" } ] }, diff --git a/CVE-2022/CVE-2022-360xx/CVE-2022-36099.json b/CVE-2022/CVE-2022-360xx/CVE-2022-36099.json index e5f5bacc901..0905e82c8c0 100644 --- a/CVE-2022/CVE-2022-360xx/CVE-2022-36099.json +++ b/CVE-2022/CVE-2022-360xx/CVE-2022-36099.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36099", "sourceIdentifier": "security-advisories@github.com", "published": "2022-09-08T21:15:08.167", - "lastModified": "2022-09-14T16:17:13.283", + "lastModified": "2023-06-27T20:52:09.843", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-116" } ] }, diff --git a/CVE-2022/CVE-2022-361xx/CVE-2022-36100.json b/CVE-2022/CVE-2022-361xx/CVE-2022-36100.json index ed315b39da5..aa265c6dbac 100644 --- a/CVE-2022/CVE-2022-361xx/CVE-2022-36100.json +++ b/CVE-2022/CVE-2022-361xx/CVE-2022-36100.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36100", "sourceIdentifier": "security-advisories@github.com", "published": "2022-09-08T21:15:08.237", - "lastModified": "2022-09-14T16:40:42.790", + "lastModified": "2023-06-27T20:52:21.010", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-116" } ] }, diff --git a/CVE-2022/CVE-2022-361xx/CVE-2022-36110.json b/CVE-2022/CVE-2022-361xx/CVE-2022-36110.json index 57f118a4f38..c982b7be4fe 100644 --- a/CVE-2022/CVE-2022-361xx/CVE-2022-36110.json +++ b/CVE-2022/CVE-2022-361xx/CVE-2022-36110.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36110", "sourceIdentifier": "security-advisories@github.com", "published": "2022-09-09T20:15:11.263", - "lastModified": "2022-09-15T03:31:27.897", + "lastModified": "2023-06-27T20:52:26.647", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-361xx/CVE-2022-36113.json b/CVE-2022/CVE-2022-361xx/CVE-2022-36113.json index b473242d7cf..cd490d21101 100644 --- a/CVE-2022/CVE-2022-361xx/CVE-2022-36113.json +++ b/CVE-2022/CVE-2022-361xx/CVE-2022-36113.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36113", "sourceIdentifier": "security-advisories@github.com", "published": "2022-09-14T18:15:10.763", - "lastModified": "2023-01-20T17:58:15.597", + "lastModified": "2023-06-27T20:52:33.817", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-22" + "value": "CWE-59" } ] }, diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36960.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36960.json index 0d8cbf256df..5a44b2be596 100644 --- a/CVE-2022/CVE-2022-369xx/CVE-2022-36960.json +++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36960.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36960", "sourceIdentifier": "psirt@solarwinds.com", "published": "2022-11-29T21:15:10.693", - "lastModified": "2022-12-01T21:16:06.653", + "lastModified": "2023-06-27T20:07:35.373", "vulnStatus": "Analyzed", "descriptions": [ { @@ -61,7 +61,11 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-287" } ] }, diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3724.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3724.json index 593d394e729..417d5ac376a 100644 --- a/CVE-2022/CVE-2022-37xx/CVE-2022-3724.json +++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3724.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3724", "sourceIdentifier": "cve@gitlab.com", "published": "2022-12-09T18:15:19.957", - "lastModified": "2022-12-14T15:13:49.850", + "lastModified": "2023-06-27T20:44:18.853", "vulnStatus": "Analyzed", "descriptions": [ { @@ -61,7 +61,7 @@ "description": [ { "lang": "en", - "value": "CWE-74" + "value": "CWE-134" } ] } diff --git a/CVE-2022/CVE-2022-381xx/CVE-2022-38114.json b/CVE-2022/CVE-2022-381xx/CVE-2022-38114.json index c8357a156ab..e75b5042a7c 100644 --- a/CVE-2022/CVE-2022-381xx/CVE-2022-38114.json +++ b/CVE-2022/CVE-2022-381xx/CVE-2022-38114.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38114", "sourceIdentifier": "psirt@solarwinds.com", "published": "2022-11-23T17:15:10.167", - "lastModified": "2022-11-28T18:19:59.670", + "lastModified": "2023-06-27T20:07:13.903", "vulnStatus": "Analyzed", "descriptions": [ { @@ -61,7 +61,11 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-444" + }, + { + "lang": "en", + "value": "CWE-79" } ] }, diff --git a/CVE-2022/CVE-2022-381xx/CVE-2022-38135.json b/CVE-2022/CVE-2022-381xx/CVE-2022-38135.json index 503f5ed99ef..4ba5ed7de0b 100644 --- a/CVE-2022/CVE-2022-381xx/CVE-2022-38135.json +++ b/CVE-2022/CVE-2022-381xx/CVE-2022-38135.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38135", "sourceIdentifier": "audit@patchstack.com", "published": "2022-09-12T21:15:11.057", - "lastModified": "2022-10-27T14:37:29.063", + "lastModified": "2023-06-27T20:01:39.443", "vulnStatus": "Analyzed", "descriptions": [ { @@ -60,8 +60,18 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-381xx/CVE-2022-38184.json b/CVE-2022/CVE-2022-381xx/CVE-2022-38184.json index 78283d08371..fa3288d23de 100644 --- a/CVE-2022/CVE-2022-381xx/CVE-2022-38184.json +++ b/CVE-2022/CVE-2022-381xx/CVE-2022-38184.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38184", "sourceIdentifier": "psirt@esri.com", "published": "2022-08-16T18:15:09.277", - "lastModified": "2022-08-17T11:36:51.287", + "lastModified": "2023-06-27T20:01:50.113", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-382xx/CVE-2022-38210.json b/CVE-2022/CVE-2022-382xx/CVE-2022-38210.json index 0a1afbe1567..7440f339bd2 100644 --- a/CVE-2022/CVE-2022-382xx/CVE-2022-38210.json +++ b/CVE-2022/CVE-2022-382xx/CVE-2022-38210.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38210", "sourceIdentifier": "psirt@esri.com", "published": "2022-12-29T20:15:09.997", - "lastModified": "2023-01-09T19:09:30.157", + "lastModified": "2023-06-27T20:14:52.507", "vulnStatus": "Analyzed", "descriptions": [ { @@ -56,8 +56,22 @@ }, "weaknesses": [ { - "source": "psirt@esri.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "psirt@esri.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3875.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3875.json index af174a6fd19..b10268aa573 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3875.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3875.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3875", "sourceIdentifier": "cna@vuldb.com", "published": "2022-12-19T11:15:10.480", - "lastModified": "2022-12-28T19:24:55.047", + "lastModified": "2023-06-27T20:14:35.760", "vulnStatus": "Analyzed", "descriptions": [ { @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3879.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3879.json index 633d5519b95..11427d79ead 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3879.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3879.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3879", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:11.047", - "lastModified": "2022-12-15T17:46:47.517", + "lastModified": "2023-06-27T20:14:22.303", "vulnStatus": "Analyzed", "descriptions": [ { @@ -39,6 +39,10 @@ "source": "nvd@nist.gov", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-352" + }, { "lang": "en", "value": "CWE-863" diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22593.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22593.json index 535ba7950ef..338fa114ad8 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22593.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22593.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22593", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-06-27T19:15:09.187", - "lastModified": "2023-06-27T19:15:09.187", - "vulnStatus": "Received", + "lastModified": "2023-06-27T20:45:06.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23468.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23468.json index 57892fcc412..aa1f4d0d481 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23468.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23468.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23468", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-06-27T19:15:09.293", - "lastModified": "2023-06-27T19:15:09.293", - "vulnStatus": "Received", + "lastModified": "2023-06-27T20:45:06.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25004.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25004.json index 699fab02268..f1b156468de 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25004.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25004.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25004", "sourceIdentifier": "psirt@autodesk.com", "published": "2023-06-27T19:15:09.383", - "lastModified": "2023-06-27T19:15:09.383", - "vulnStatus": "Received", + "lastModified": "2023-06-27T20:45:06.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27429.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27429.json index 38355be389c..896f741bb48 100644 --- a/CVE-2023/CVE-2023-274xx/CVE-2023-27429.json +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27429.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27429", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-21T14:15:09.690", - "lastModified": "2023-06-21T15:14:56.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T20:54:54.337", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:automattic:jetpack_crm:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.5.0", + "matchCriteriaId": "FAAFC1A9-08C4-43CE-A191-9F7657709FBB" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/zero-bs-crm/wordpress-jetpack-crm-clients-leads-invoices-billing-email-marketing-automation-plugin-5-4-4-cross-site-scripting-xss?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27439.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27439.json index 1f3ad1485d0..bd459b9e14b 100644 --- a/CVE-2023/CVE-2023-274xx/CVE-2023-27439.json +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27439.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27439", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-21T13:15:09.910", - "lastModified": "2023-06-21T15:14:56.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T20:54:24.717", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:new_adman_project:new_adman:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.6.8", + "matchCriteriaId": "2FC4851E-0CDD-4180-A014-BB55C496316B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/new-adman/wordpress-new-adman-plugin-1-6-8-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29068.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29068.json index 12c336ca81f..ba2059347af 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29068.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29068.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29068", "sourceIdentifier": "psirt@autodesk.com", "published": "2023-06-27T19:15:09.457", - "lastModified": "2023-06-27T19:15:09.457", - "vulnStatus": "Received", + "lastModified": "2023-06-27T20:45:06.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30993.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30993.json new file mode 100644 index 00000000000..4f1fc8cae7b --- /dev/null +++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30993.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-30993", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-06-27T20:15:09.620", + "lastModified": "2023-06-27T20:45:06.090", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Cloud Pak for Security (CP4S) 1.9.0.0 through 1.9.2.0 could allow an attacker with a valid API key for one tenant to access data from another tenant's account. IBM X-Force ID: 254136." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/254136", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/6995221", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32538.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32538.json index 91336870e12..1e5ffb384fd 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32538.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32538.json @@ -2,23 +2,86 @@ "id": "CVE-2023-32538", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-19T05:15:09.553", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T20:50:08.593", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted SIM2 file may lead to information disclosure and/or arbitrary code execution. This vulnerability is different from CVE-2023-32273 and CVE-2023-32201." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fujielectric:tellus:4.0.15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "30687838-02B8-43D9-AE6F-BD508BC2B3AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fujielectric:tellus_lite:4.0.15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3375800A-B58B-4D4E-A68A-BE8D9CACDBAB" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU98818508/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32542.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32542.json index 1671355da80..85a76ea4d98 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32542.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32542.json @@ -2,23 +2,86 @@ "id": "CVE-2023-32542", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-19T05:15:09.593", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T20:49:23.610", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Out-of-bounds read vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted V8 file may lead to information disclosure and/or arbitrary code execution." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fujielectric:tellus:4.0.15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "30687838-02B8-43D9-AE6F-BD508BC2B3AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fujielectric:tellus_lite:4.0.15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3375800A-B58B-4D4E-A68A-BE8D9CACDBAB" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU98818508/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3436.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3436.json new file mode 100644 index 00000000000..1074f5a4503 --- /dev/null +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3436.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-3436", + "sourceIdentifier": "xpdf@xpdfreader.com", + "published": "2023-06-27T21:15:16.047", + "lastModified": "2023-06-27T21:15:16.047", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Xpdf 4.04 will deadlock on a PDF object stream whose \"Length\" field is itself in another object stream.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "xpdf@xpdfreader.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "xpdf@xpdfreader.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-833" + } + ] + } + ], + "references": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?t=42618", + "source": "xpdf@xpdfreader.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36463.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36463.json new file mode 100644 index 00000000000..9222059d1cb --- /dev/null +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36463.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-36463", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-06-27T20:15:09.727", + "lastModified": "2023-06-27T20:45:06.090", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Meldekarten generator is an open source project to create a program, running locally in the browser without the need for an internet-connection, to create, store and print registration cards for volunteers. All text fields on the webpage are vulnerable to XSS attacks. The user input isn't (fully) sanitized after submission. This issue has been addressed in commit `77e04f4af` which is included in the `1.0.0b1.1.2` release. Users are advised to upgrade. There are no known workarounds for this vulnerability. " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jucktnich/meldekarten-generator/commit/77e04f4af85a6d0b08e616d40eaa81877a108c96", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jucktnich/meldekarten-generator/security/advisories/GHSA-f2gp-85cr-vgj7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 41cbcfb9c43..6d7c5617ded 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-27T20:00:29.951267+00:00 +2023-06-27T22:00:27.807785+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-27T19:59:39.177000+00:00 +2023-06-27T21:15:16.047000+00:00 ``` ### Last Data Feed Release @@ -29,61 +29,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -218683 +218694 ``` ### CVEs added in the last Commit -Recently added CVEs: `17` +Recently added CVEs: `11` -* [CVE-2020-18418](CVE-2020/CVE-2020-184xx/CVE-2020-18418.json) (`2023-06-27T19:15:09.047`) -* [CVE-2022-34352](CVE-2022/CVE-2022-343xx/CVE-2022-34352.json) (`2023-06-27T18:15:11.993`) -* [CVE-2023-26273](CVE-2023/CVE-2023-262xx/CVE-2023-26273.json) (`2023-06-27T18:15:12.640`) -* [CVE-2023-26274](CVE-2023/CVE-2023-262xx/CVE-2023-26274.json) (`2023-06-27T18:15:12.717`) -* [CVE-2023-26276](CVE-2023/CVE-2023-262xx/CVE-2023-26276.json) (`2023-06-27T18:15:12.783`) -* [CVE-2023-28857](CVE-2023/CVE-2023-288xx/CVE-2023-28857.json) (`2023-06-27T18:15:13.120`) -* [CVE-2023-33566](CVE-2023/CVE-2023-335xx/CVE-2023-33566.json) (`2023-06-27T18:15:13.463`) -* [CVE-2023-33567](CVE-2023/CVE-2023-335xx/CVE-2023-33567.json) (`2023-06-27T18:15:13.510`) -* [CVE-2023-34835](CVE-2023/CVE-2023-348xx/CVE-2023-34835.json) (`2023-06-27T18:15:13.557`) -* [CVE-2023-34836](CVE-2023/CVE-2023-348xx/CVE-2023-34836.json) (`2023-06-27T18:15:13.603`) -* [CVE-2023-34837](CVE-2023/CVE-2023-348xx/CVE-2023-34837.json) (`2023-06-27T18:15:13.653`) -* [CVE-2023-34838](CVE-2023/CVE-2023-348xx/CVE-2023-34838.json) (`2023-06-27T18:15:13.700`) -* [CVE-2023-34839](CVE-2023/CVE-2023-348xx/CVE-2023-34839.json) (`2023-06-27T18:15:13.747`) -* [CVE-2023-22593](CVE-2023/CVE-2023-225xx/CVE-2023-22593.json) (`2023-06-27T19:15:09.187`) -* [CVE-2023-23468](CVE-2023/CVE-2023-234xx/CVE-2023-23468.json) (`2023-06-27T19:15:09.293`) -* [CVE-2023-25004](CVE-2023/CVE-2023-250xx/CVE-2023-25004.json) (`2023-06-27T19:15:09.383`) -* [CVE-2023-29068](CVE-2023/CVE-2023-290xx/CVE-2023-29068.json) (`2023-06-27T19:15:09.457`) +* [CVE-2020-18406](CVE-2020/CVE-2020-184xx/CVE-2020-18406.json) (`2023-06-27T20:15:09.297`) +* [CVE-2020-18410](CVE-2020/CVE-2020-184xx/CVE-2020-18410.json) (`2023-06-27T20:15:09.373`) +* [CVE-2020-18413](CVE-2020/CVE-2020-184xx/CVE-2020-18413.json) (`2023-06-27T20:15:09.423`) +* [CVE-2020-18416](CVE-2020/CVE-2020-184xx/CVE-2020-18416.json) (`2023-06-27T20:15:09.473`) +* [CVE-2020-19902](CVE-2020/CVE-2020-199xx/CVE-2020-19902.json) (`2023-06-27T20:15:09.520`) +* [CVE-2020-18404](CVE-2020/CVE-2020-184xx/CVE-2020-18404.json) (`2023-06-27T21:15:15.650`) +* [CVE-2020-18409](CVE-2020/CVE-2020-184xx/CVE-2020-18409.json) (`2023-06-27T21:15:15.717`) +* [CVE-2020-18414](CVE-2020/CVE-2020-184xx/CVE-2020-18414.json) (`2023-06-27T21:15:15.763`) +* [CVE-2023-30993](CVE-2023/CVE-2023-309xx/CVE-2023-30993.json) (`2023-06-27T20:15:09.620`) +* [CVE-2023-36463](CVE-2023/CVE-2023-364xx/CVE-2023-36463.json) (`2023-06-27T20:15:09.727`) +* [CVE-2023-3436](CVE-2023/CVE-2023-34xx/CVE-2023-3436.json) (`2023-06-27T21:15:16.047`) ### CVEs modified in the last Commit -Recently modified CVEs: `128` +Recently modified CVEs: `41` -* [CVE-2023-28288](CVE-2023/CVE-2023-282xx/CVE-2023-28288.json) (`2023-06-27T18:15:12.940`) -* [CVE-2023-28293](CVE-2023/CVE-2023-282xx/CVE-2023-28293.json) (`2023-06-27T18:15:13.020`) -* [CVE-2023-2724](CVE-2023/CVE-2023-27xx/CVE-2023-2724.json) (`2023-06-27T18:15:13.197`) -* [CVE-2023-30198](CVE-2023/CVE-2023-301xx/CVE-2023-30198.json) (`2023-06-27T18:15:13.287`) -* [CVE-2023-33137](CVE-2023/CVE-2023-331xx/CVE-2023-33137.json) (`2023-06-27T18:15:13.380`) -* [CVE-2023-33495](CVE-2023/CVE-2023-334xx/CVE-2023-33495.json) (`2023-06-27T18:19:44.590`) -* [CVE-2023-34596](CVE-2023/CVE-2023-345xx/CVE-2023-34596.json) (`2023-06-27T18:23:44.610`) -* [CVE-2023-34597](CVE-2023/CVE-2023-345xx/CVE-2023-34597.json) (`2023-06-27T18:31:10.617`) -* [CVE-2023-3340](CVE-2023/CVE-2023-33xx/CVE-2023-3340.json) (`2023-06-27T18:31:12.860`) -* [CVE-2023-34600](CVE-2023/CVE-2023-346xx/CVE-2023-34600.json) (`2023-06-27T18:32:14.227`) -* [CVE-2023-34541](CVE-2023/CVE-2023-345xx/CVE-2023-34541.json) (`2023-06-27T18:34:05.143`) -* [CVE-2023-32339](CVE-2023/CVE-2023-323xx/CVE-2023-32339.json) (`2023-06-27T18:34:43.840`) -* [CVE-2023-34098](CVE-2023/CVE-2023-340xx/CVE-2023-34098.json) (`2023-06-27T18:34:43.840`) -* [CVE-2023-34099](CVE-2023/CVE-2023-340xx/CVE-2023-34099.json) (`2023-06-27T18:34:43.840`) -* [CVE-2023-34240](CVE-2023/CVE-2023-342xx/CVE-2023-34240.json) (`2023-06-27T18:34:43.840`) -* [CVE-2023-34830](CVE-2023/CVE-2023-348xx/CVE-2023-34830.json) (`2023-06-27T18:34:43.840`) -* [CVE-2023-35799](CVE-2023/CVE-2023-357xx/CVE-2023-35799.json) (`2023-06-27T18:34:43.840`) -* [CVE-2023-35800](CVE-2023/CVE-2023-358xx/CVE-2023-35800.json) (`2023-06-27T18:34:43.840`) -* [CVE-2023-31239](CVE-2023/CVE-2023-312xx/CVE-2023-31239.json) (`2023-06-27T18:35:46.850`) -* [CVE-2023-30759](CVE-2023/CVE-2023-307xx/CVE-2023-30759.json) (`2023-06-27T18:36:55.627`) -* [CVE-2023-35857](CVE-2023/CVE-2023-358xx/CVE-2023-35857.json) (`2023-06-27T18:37:38.063`) -* [CVE-2023-32465](CVE-2023/CVE-2023-324xx/CVE-2023-32465.json) (`2023-06-27T18:39:23.987`) -* [CVE-2023-3036](CVE-2023/CVE-2023-30xx/CVE-2023-3036.json) (`2023-06-27T18:40:38.283`) -* [CVE-2023-2673](CVE-2023/CVE-2023-26xx/CVE-2023-2673.json) (`2023-06-27T18:41:28.450`) -* [CVE-2023-35095](CVE-2023/CVE-2023-350xx/CVE-2023-35095.json) (`2023-06-27T19:51:44.547`) +* [CVE-2022-22715](CVE-2022/CVE-2022-227xx/CVE-2022-22715.json) (`2023-06-27T20:23:36.597`) +* [CVE-2022-26125](CVE-2022/CVE-2022-261xx/CVE-2022-26125.json) (`2023-06-27T20:23:49.610`) +* [CVE-2022-26127](CVE-2022/CVE-2022-261xx/CVE-2022-26127.json) (`2023-06-27T20:26:26.217`) +* [CVE-2022-26128](CVE-2022/CVE-2022-261xx/CVE-2022-26128.json) (`2023-06-27T20:38:30.520`) +* [CVE-2022-25817](CVE-2022/CVE-2022-258xx/CVE-2022-25817.json) (`2023-06-27T20:39:56.397`) +* [CVE-2022-25959](CVE-2022/CVE-2022-259xx/CVE-2022-25959.json) (`2023-06-27T20:40:57.613`) +* [CVE-2022-26090](CVE-2022/CVE-2022-260xx/CVE-2022-26090.json) (`2023-06-27T20:42:45.240`) +* [CVE-2022-1441](CVE-2022/CVE-2022-14xx/CVE-2022-1441.json) (`2023-06-27T20:43:05.850`) +* [CVE-2022-3724](CVE-2022/CVE-2022-37xx/CVE-2022-3724.json) (`2023-06-27T20:44:18.853`) +* [CVE-2022-2566](CVE-2022/CVE-2022-25xx/CVE-2022-2566.json) (`2023-06-27T20:44:29.407`) +* [CVE-2022-25649](CVE-2022/CVE-2022-256xx/CVE-2022-25649.json) (`2023-06-27T20:44:35.397`) +* [CVE-2022-22034](CVE-2022/CVE-2022-220xx/CVE-2022-22034.json) (`2023-06-27T20:44:45.057`) +* [CVE-2022-2639](CVE-2022/CVE-2022-26xx/CVE-2022-2639.json) (`2023-06-27T20:52:02.907`) +* [CVE-2022-36099](CVE-2022/CVE-2022-360xx/CVE-2022-36099.json) (`2023-06-27T20:52:09.843`) +* [CVE-2022-36100](CVE-2022/CVE-2022-361xx/CVE-2022-36100.json) (`2023-06-27T20:52:21.010`) +* [CVE-2022-36110](CVE-2022/CVE-2022-361xx/CVE-2022-36110.json) (`2023-06-27T20:52:26.647`) +* [CVE-2022-36113](CVE-2022/CVE-2022-361xx/CVE-2022-36113.json) (`2023-06-27T20:52:33.817`) +* [CVE-2023-22593](CVE-2023/CVE-2023-225xx/CVE-2023-22593.json) (`2023-06-27T20:45:06.090`) +* [CVE-2023-23468](CVE-2023/CVE-2023-234xx/CVE-2023-23468.json) (`2023-06-27T20:45:06.090`) +* [CVE-2023-25004](CVE-2023/CVE-2023-250xx/CVE-2023-25004.json) (`2023-06-27T20:45:06.090`) +* [CVE-2023-29068](CVE-2023/CVE-2023-290xx/CVE-2023-29068.json) (`2023-06-27T20:45:06.090`) +* [CVE-2023-32542](CVE-2023/CVE-2023-325xx/CVE-2023-32542.json) (`2023-06-27T20:49:23.610`) +* [CVE-2023-32538](CVE-2023/CVE-2023-325xx/CVE-2023-32538.json) (`2023-06-27T20:50:08.593`) +* [CVE-2023-27439](CVE-2023/CVE-2023-274xx/CVE-2023-27439.json) (`2023-06-27T20:54:24.717`) +* [CVE-2023-27429](CVE-2023/CVE-2023-274xx/CVE-2023-27429.json) (`2023-06-27T20:54:54.337`) ## Download and Usage